Cox et al., “Secure Spread Spectrum Watermarking for Images, Audio, and Video,” IEEE1996, pp. 243-246. |
Dautzenberg, “Watermarking Images,” Department of Microelectronics and Electrical Engineering, Trinity College Dublin, 47 pages, Oct. 1994. |
Dittmann, J., “Chapter 3: Telltale Watermarking,” in Multiresolution Digital Watermarking: Algorithms and Implications for Multimedia Signals, Ph.D. thesis at Univ. of Toronto, 1999, pp. 23-52. |
Dittmann, J. et al., “Content-based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking,” IEEE Proc. Int. Conf. on Multimedia Computing and Systems, Jun. 1999, pp. 209-213. |
Kundur et al., “A Robust Digital Image Watermarking Method and Wavelet-Based Fusion,” IEEE Jul. 1997, pp. 544,547. |
Lamy, P. et al., “Content-Based Watermarking for Image Authentication,” Proc. 3.sup.rd Int. Workshop on Information Hiding, Sep./Oct. 1999, pp. 187-198. |
Lin, C.-Y. et al., “Generating Robust Digital Signature for Image/Video Authentication,” Proc. Multimedia and Security Workshop at ACM Multimedia'98, Sep. 1998, pp. 49-54. |
Lin, C.-Y. et al., “Issues and Solutions for Authenticating MPEG Video,” Proc. SPIE vol. 3657: Security and Watermarking of Multimedia Contents, Jan. 1999, pp. 54-65. |
Schneider, M., “A Robust Content Based Digital Signature for Image Authentication,” IEEE Proc. Int. Conf. on Image Processing, Sep. 1996, pp. 227-230 (vol. 3). |
Sharma et al., “Practical Challenges For Digital Watermarking Applications”, May 3, 2001, pp. 1-10. |
Szepanski, “A Signal Theoretic Method for Creating Forgery-Proof Documents for Automatic Verification,” Proceedings 1979 Carnahan Conference on Crime Countermeasures, May 16, 1979, pp. 101-109. |
Szepanski, “Additive Binary Data Transmission for Video Signals,” Conference of the Communications Engineering Society, 1980, NTG Technical Reports, vol. 74, pp. 343-351. (German text and English translation enclosed). |
Xie, L. et al., “Secure MPEG Video Communications by Watermarking,” Proc. Conf. of ATIRP (Advanced Telecommunications and Information Distribution Research Project), Feb. 1999, pp. 459-462. |
Brassil et al., Electronic Marking and Identification Techniques to Discourage Document Copying, Proceedings of INFOCOM '94 Conference on Computer, IEEE Commun. Soc Conference, Jun. 12-16, 1994, 1278-1287. |
Bruckstein, A.M.; Richardson, T.J., A holographic transform domain image watermarking method, Circuits, Systems, and Signal Processing vol. 17, No. 3 p. 361-389, 1998. This paper includes an appendix containing an internal memo of Bell Labs, which according to the authors of the paper, was dated Sep. 1994. |
“High Water FBI Limited Presentation Image Copyright protection Software,” FBI Ltd brochure, Jul., 1995, 17 pages. |
Koch et al., “Copyright Protection for Multimedia Data,” Fraunhofer Institute for Computer Graphics, Dec. 16, 1994, 15 pages. |
Koch et al., “Towards Robust and Hidden Image Copyright Labeling,” Proc. of 1995 IEEE Workshop on Nonlinear Signal and Image Processing, Jun. 20-22, 1995, 4 pages. |
Kurak et al., “A Cautionary Note On Image Downgrading,” 1992 IEEE, pp. 153-159. |
Mintzer et al., “Safeguarding Digital library Contents and Users” Digital Watermarking, D-Lib Magazine, Dec. 1997: ISSN 1082-9873. |
Rindfrey, “Towards an Equitable System for Access Control and Copyright Protection in Broadcast Image Services: The Equicrypt Approach,” Intellectual Property Rights and New Technologies, Proc. of the Conference, R. Oldenbourg Verlag Wien Munchen 1995, 12 pages. |
Schreiber et al., “A Compatible High-Definition Television System Using the Noise-Margin Method of Hiding Enhancement Information,” SMPTE Journal, Dec. 1989, pp. 873-879. |
SDMI Example Use Scenarios (Non-Exhaustive), Version 1.2, Jun. 16, 1999. |
Szepanski, “A Signal Theoretic Method for Creating Forgery-Proof Documents for Automatic Verification,” Proceedings 1979 Carnahan Conference on Crime Countermeasures, May 16, 1979, pp. 101-109. |
Szepanski, “Additive Binary Data Transmission for Video Signals,” Papers Presented at Conf. Of Comm. Engineering Soc. Sep. 30-Oct. 3, 1980, Technical Reports vol. 74, pp. 342-352. |
Tanaka et al., “A Visual Retrieval System with Private Information for Image Database,” Proceeding International Conference on DSP Applications and Technology, Oct. 1991, pp. 415-421. |
Tanaka et al., “New Integrated Coding Schemes for Computer-Aided Facsimile,” Proc. IEEE Int'l Conf. on Sys. Integration, Apr. 1990, pp. 275-281. |
Tirkel et al, “Electronic Water Mark,” DICTA-93, Macquarie University, Sydney, Australia, Dec., 1993, pp. 666-673. |
Weber et al., “Correlative Image Registration,” Seminars in Nuclear Medicine, vol. XXIV, No. 4, Oct., 1994, pp. 311-323. |
Szepanski, “A Signal Theoretic Method for Creating Forgery-Proof Documents for Automatic Verification,” Proceedings 1979 Carnahan Conference on Crime Countermeasures, May 16, 1979, pp. 101-109. |
Dautzenberg, “Watermarking Images,” Department of Microelectronics and Electrical Engineering, Trinity College Dublin, 47 pages, Oct. 1994. |
Szepanski, “Additive Binary Data Transmission for Video Signals,” Conference of the Communications Engineering Society, 1980, NTG Technical Reports, vol. 74, pp. 343-351. (German text and English translation enclosed). |
Cookson, Chris, General Principles of Music Uses on Portable Devices, presented to SDMI, Mar. 5, 1999. |
Winograd, J.M., “Audio Watermarking Architecture for Secure Digital Music Distribution,” a Proposal to the SDMI Portable Devices Working Group, by Aris Technologies, Inc., Mar. 26, 1999. |
Mintzer et al., “Safeguarding Digital Library Contents and Users: Digital Watermarking,” D-Lib Magazine, Dec. 1997, 12 pages. |
Audio Watermarking Architectures for Secure Digital Music Distribution, A Proposal to the SDMI Portable Devices Working Group by ARIS Technologies, Inc, Mar. 26, 1999, pp. 1-11. |
Audio Watermarking Architectures for Persistent Protection, Presentation to SDMI PDWG, Mar. 29, 1999, J. Winograd, Aris Technologies, pp 1-16. |
Audio Watermarking System to Screen Digital Audio Content for LCM Acceptance, A Proposal Submitted in Response to PDWG99050504-Transition CfP by ARIS Technologies, Inc., May 23, 1999, Document Version 1.0, 15 pages. |
Boland et al., “Watermarking Digital Images for Copyright Protection”, Fifth Int'l Conference on Image Processing and it's Application, Jul. 1995, pp. 326-330. |
Levy, “AIPL's Proposal for SDMI: An Underlying Security System” (slide presentation), Mar. 29, 1999, 23 slides. |
Microsoft Response for CfP for Technology Solutions to Screen Digital Audio Contents for LCM Acceptance, SDMI, PDWG Tokyo, May 23, 1999, 9 pages. |
Response to CfP for Technology Solutions to Screen Digital Audio Content for LCM Acceptance, NTT Waveless Radio Consotium, May 23, 1999, 9 pages. |
Sandford II et al., “The Data Embedding Method”, Proceedings of the SPIE vol. 2615, pp. 226-259, 1996. |
Thomas, Keith, Screening Technology for Content from Compact Discs, May 24, 1999, 11 pages. |
Tirkel et al., “Electronic Water Mark,” Dicta-93, Marquarie University, Sydney, Australia, Dec., 1993, pp. 666-672. |
Vidal et al., “Non-Noticeable Information Embedding in Color Images: Marking and Detection”, IEEE 1999, pp. 293-297. |
Wolfgang et al., “A Watermark for Digital Images,” Computer Vision and Image Processing Laboratory, Purdue University, Sep. 1996, pp. 219-222. |
“Access Control and COpyright Protection for Images, WorkPackage 8: Watermarking,” Jun. 30, 1995, 46 pages. |
“Access Control and COpyright Protection for Images, WorkPackage 3: Evaluation of Existing Systems,” Apr. 19, 1995, 68 pages. |
“Access Control and COpyright Protection for Images, WorkPackage 1: Access Control and Copyright Protection for Images Need Evaluation,” Jun., 1995, 21 pages. |
“Access Control and COpyright Protection for Images, Conditional Access and Copyright Protection Based on the Use of Trusted Third Parties,” 1995, 43 pages. |
Arachelian, “White Noise Storm,” Apr. 11, 1994, Internet reference, 13 pages. |
Arazi, et al., “Intuition, Perception, and Secure Communication,” IEEE Transactionson Systems, Man, and Cybernetics, vol. 19, No. 5, Sep./Oct. 1989, pp. 1016-1020. |
Arthur, “Digital Fingerprints Protect Artwork,” New Scientist, Nov. 12, 1994, p. 24. |
Aura, “Invisible Communication,” Helskinki University of Technology, Digital Systems Laboratory, Nov. 5, 1995, 13 pages. |
Bender et al, “Techniques for Data Hiding,” Draft Preprint, Private Correspondence, dated Oct. 30, 1995. |
Bender et al., “Techniques for Data Hiding,” Massachusetts Institute of Technology, Media Laboratory, Jan. 1995, 10 pages. |
Boneh, “Collusion-Secure Fingerprinting for Digital Data,” Department of Computer Science, Princeton University, 1995, 31 pages. |
Boney et al., “Digital Watermarks for Audio Signals,” Proceedings of Multimedia '96, 1996 IEEE, pp. 473-480. |
Boucqueau et al., Equitable Conditional Access and Copyright Protection for Image Based on Trusted Third Parties, Teleservices & Multimedia Communications, 2nd Int. Cost 237 Workshop, Second International Cost 237 Workshop, Nov., 1995; published 1996, pp. 229-243. |
Brassil et al., “Hiding Information in Document Images,” Nov., 1995, 7 pages. |
Brown, “S-Tools for Windows, Version 1.00, .COPYRGT. 1994 Andy Brown, What is Steganography,” Internet reference, Mar. 6, 1994, 6 pages. |
Bruyndonckx et al., Neural Network Post-Processing of Coded Images Using Perceptual Masking, 1994, 3 pages. |
Bruyndonckx et al., “Spatial Method for Copyright Labeling of Digital Images,” 1994, 6 pages. |
Burgett et al., “A Novel Method for Copyright Labeling Digitized Image Data,” requested by e-mail from author (unavailable/password protected on IGD WWW site); received Sep. 18, 1995, 12 pages. |
Caronni, “Assuring Ownership Rights for Digital Images,” Published in the Proceedings of ‘Reliable IT Systems,’ VIS '95, HH. Bruggemann and W. Gerhardt-Hackl (Ed.), Vieweg Publishing Company, Germany, 1995, Jun. 14, 1994, 10 pages. |
Caruso, “Digital Commerce, 2 plans for watermarks, which can bind proof of authorship to electronic works.” New York Times, Aug. 7, 1995, one page. |
Castro et al., “Registration of Translated and Rotated Images Using Finite Fourier Transforms,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. PAMI-9, No. 5, Sep. 1987, pp. 700-703. |
Choudhury, et al., “Copyright Protection for Electronic Publishing over Computer Networks,” IEEE Network Magazine, Jun. 1994, 18 pages. |
Clarke, “Invisible Code Tags Electronic Images,” Electronic Engineering Times, Jun. 12, 1995, n. 852, p. 42. |
“Copyright Protection for Digital Images, Digital Fingerprinting from FBI,” Highwater FBI brochure, 1995, 4 pages. |
“The Copyright Can of Worms Opened Up By The New Electronic Media,” Computergram Internations, pCGN07170006, Jul. 17, 1995 and “The Copyright Can of Worms Opened Up By the New Electronic Media—2,” Computergram Internations, pCGN07210008, Jul. 21, 1995, 3 pages total. |
Cox et al., “Secure Spread Spectrum Watermarking for Multimedia,” NEC Research Institute Technical Report, Dec. 5, 1995, 33 pages. |
Cox et al., “A Secure, Imperceptable Yet Perceptually Salient, Spread Spectrum Watermark for Multimedia,” IEEE, Southcon/96, Conference Record, pp. 192-197, 1996. |
“Cyphertech Systems: Introduces Digital Encoding Device to Prevent TV Piracy,” Hollywood Reporter, Oct. 20, 1993, p. 23. |
Delaigle et al., “Digital Watermarking,” Proc. SPIE—Int. Soc. Opt. Eng., vol. 2659, pp. 99-110, 1996. |
Delaigle et al., “A Psychovisual Approach for Digital Picture Watermarking,” 1995, 20 pages. |
DICE Digital Watermark System, Q&A, Dec., 1995, 12 pages. |
Digimarc presentation at RSA Conference, approximately Jan. 17, 1996, 4 pages. |
Fimmerstad, “The Virtual Art Museum,” Ericsson Connexion, Dec., 1995, pp. 29-31. |
Fitzgerald, “Invisible Digital Copyright ID,” Editor & Publisher, Jun. 25, 1994, p. 62. |
“Foiling Card Forgers With Magnetic ‘Noise,’” Wall Street Journal, Feb. 8, 1994. |
Frequently Asked Questions About Digimarc Signature Technology, Aug. 1, 1995, HTTP://WWW.DIGIMARC.COM, 9 pages. |
Friedman, “The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image,” IEEE Transactions on Consumer Electronics, vol. 39, No. 4, Nov., 1993, pp. 905-910. |
Gabor, et al., “Theory of Communication,” J. Inst. Elect. Eng. 93, 1946, pp. 429-441. |
Hartung et al., Digital Watermarking of Raw and Compressed Video, Proc. SPIE 2952, Digital Compression Technologies and Systems for Video Communications, Oct., 1996, pp 205-213. |
Hecht, “Embedded Data Glyph Technology for Hardcopy Digital Documents,” SPIE vol. 2171, Feb. 1994, pp. 341-352. |
“Holograhic signatures for ditigal images,” The Seybold Report on Desktop Publishing, Aug. 1995, one page. |
Humphrey, “Stamping Out Crime,” Hollywood Reporter, Jan. 26, 1994, p. S48. |
Jain, “Image Coding Via a Nearest Neighbors Image Model,” IEEE Transactions on Communications, vol. COM-23, No. 3, Mar. 1975, pp. 318-331. |
Johhnson, “Steganography,” Dec. 10, 1995, 32 pages. |
JPEG Group's JPEG Software (release 4), FTP.CSUA.BEREKELEY.EDU/PUB/CYPHERPUNKS/APPLICATIONS/ JSTEG/JPEG.ANNOUNCEMENT.GZ. |
Kassam, Signal Detection in Non-Gaussian Noise, Dowden & Culver, 1988, pp. 1-96. |
Koch et al., “Digital Copyright Labeling: Providing Evidence of Misuse and Tracking Unauthorized Distribution of Copyrighted Materials,” Oasis Magazine, Dec. 1995, 3 pages. |
Luc, “Analysis of Spread Spectrum System Parameters for Design of Hidden Transmission,” Radioengineering, vol. 4, No. 2, Jun. 1995, pp. 26-29. |
Machado, “Announcing Stego 1.0a2, The First Steganography Tool for the Macintosh,” Internet reference, Nov. 28, 1993, 3 pages. |
Macq, “Cryptology for Digital TV Broadcasting,” Proceedings of the IEEE, vol. 83, No. 6, Jun. 1995, pp. 944-957. |
Matthews, “When Seeing is Not Believing,” New Scientist, Oct. 16, 1993, pp. 13-15. |
Matsui et al., “Video-Steganography: How to Secretly Embed a Signature in a Picture,” IMA Intellectual Property Project Proceedings, Jan. 1994, vol. 1, Issue 1, pp. 187-205. |
Mintzer et al., “Toward on-line, Worldwide Access to Vatican Library Materials,” IBM J. Res. Develop. vol. 40 No. 2, Mar., 1996, pp. 139-162. |
Moller, et al., “Rechnergestutzte Steganographie: Wie sie Funktioniert und warum folglich jede Reglementierung von Verschlusselung unsinnig ist,” DuD, Datenschutz und Datensicherung, Jun. 18, 1994 318-326. |
“NAB—Cyphertech Starts Anti-Piracy Broadcast Tests,” Newsbytes, NEW03230023, Mar. 23, 1994. |
Nakamura et al., “A Unified Coding Method of Image and Text Data Using Discrete Orthogonal Transform,” Systems and Computers in Japan, vol. 21, No. 3, 1990, pp. 87-92. |
Nakamura et al., “A Unified Coding Method of Dithered Image and Text Data Using Micropatterns,” Electronics and Communications in Japan, Part 1, vol. 72, No. 4, 1989, pp. 50-56. |
New Product Information, “FBI at AppleExpo” (Olympia, London), Nov., 1995, 2 pages. |
Ohnishi et al., Embedding a Seal into a Picture Under Orthogonal Wavelet Transform, Proceedings of Multimedia '96, 1996, IEEE, pp. 514-421. |
ORuanaidh et al, “Watermarking Ditigal Images for Copyright Protection,” http://www.kalman.mee.tcd.ie/people/jjr/eva.sub.—pap.html, Feb. 2, 1996, 8 pages (Also published Aug., 1996, IEE Proceedings-Vision, Image and Signal Processing, vol . 143, No. 4, pp. 250-256.). |
Pennebaker et al., JPEG Still Image Data Compression Standard, Chapter 3, “Aspects of the Human Visual System,” pp. 23-27, 1993, Van Nostrand Reinhold, New York. |
Pickholtz et al., “Theory of Spread-Spectrum Communications—A Tutorial,” Transactions on Communications, vol. COM-30, No. 5, May, 1982, pp. 855-884. |
Pitas et al., “Applying Signatures on Digital Images,” IEEE Workshop on Nonlinear Image and Signal Processing, Neos Marmaras, Greece, pp. 460-463, Jun., 1995. |
Port, “Halting Highway Robbery on the Internet,” Business Week, Oct. 17, 1994, p. 212. |
Roberts, “Picture Coding Using Pseudorandom Noise,” IRE Trans. on Information Theory, vol. 8, No. 2, Feb., 1962, pp. 145-154. |
Sapwater et al., “Electronic Copyright Protection,” Photo>Electronic Imaging, vol. 37, No. 6, 1994, pp. 16-21. |
Schneier, “Digital Signatures, Cryptographic Algorithms Can Create Nonforgeable Signatures for Electronic Documents, Making Them Valid Legal Instruments” BYTE, Nov. 1993, pp. 309-312. |
shaggy@phantom.com, “Hide and Seek v. 4.0,” Internet reference, Apr. 10, 1994, 3 pages. |
Short, “Steps Toward Unmasking Secure Communications,” International Journal of Bifurcation and Chaos, vol. 4, No. 4, 1994, pp. 959-977. |
Simmons, “Subliminal Channels; Past and Present,” ETT, vol. 5, No. 4, Jul.-Aug. 1994, pp. 45-59. |
Sheng et al., “Experiments on Pattern Recognition Using Invariant Fourier-Mellin Descriptors,” Journal of Optical Society of America, vol. 3, No. 6, Jun., 1986, pp. 771-776. |
Skylar, “A Structured Overview of Digital Communications—a Tutorial Review—Part I,” IEEE Communications Magazine, Aug., 1983, pp. 1-17. |
Skylar, “A Structured Overview of Digital Communications—a Tutorial Review—Part II,” IEEE Communications Magazine, Oct., 1983, pp. 6-21. |
“Steganography,” Intellectual Property and the National Information Infrastructure The Report of the Working Group on Intellectual Property Rights, Sep. 1995, pp. 212-213. |
Tanaka et al., “Embedding Secret Information Into a Dithered Multi-Level Image,” Proc. IEEE Military Comm. Conf., Sep. 1990, pp. 216-220. |
Tanaka, “Embedding the Attribute Information Into a Dithered Image,” Systems and Computers in Japan, vol. 21, No. 7, 1990, pp. 43-50. |
Tirkel et al., “A Two-Dimensional Digital Watermark,” 1995, 6 pages. |
Toga et al., “Registration Revisited,” Journal of Neuroscience Methods, 48 (1993), pp. 1-13. |
van Schyndel et al., “Towards a Robust Digital Watermark,” ACCV '95, vol. 2, Dec., 1995, pp. 504-508. |
Wagner, “Fingerprinting,” 1983 IEEE, pp. 18-22. |
Walton, “Image Authentication for a Slippery New Age,” Dr. Dobb's Journal, Apr. 1995, pp. 18-26, 82-87. |
“Watermarking & Digital Signature: Protect Your Work!” Published on Internet 1996, http://Itswww.epfl.ch/.about.jordan/watermarking.html. |
Wise, “The History of Copyright, Photographers' Rights Span Three Centuries,” Photo>Electronic Imaging, vol. 37, No. 6, 1994. |
van Schyndel et al., “A Digital Watermark,” IEEE International Conference on Image Processing, Nov. 13-16, 1994, pp. 86-90. |
Zhao et al., “Embedding Robust Labels Into Images for Copyright Protection,” Proc. of the International Congress on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies (Vienna, Austria) Aug. 21-25, 1995, 10 pages. |
Bender, “Applications for Data Hiding,” IBM Systems Journal, vol. 39, No. 3-4, pp. 547-568, 2000. |
Gruhl et al., “Information Hiding to Foil the Casual Counterfeiter,” Proc. 2d Information Hiding Workshop, LNCS vol. 1525, pp. 1-15 (Apr. 15, 1998). |
Arthur, “Digital Fingerprints Protect Artwork,” New Scientist, Nov. 12, 1994, p. 24. |
Bender et al., “Applications for Data Hiding,” IBM Systems Journal, vol. 39, Nos. 3&4, 2000, pp. 547-568. |
Yeung et al., “Digital Watermarks: Shedding Light on the Invisible,” Nov.-Dec. 1998, IEEE Micro vol. 18, No. 6, pp. 32-41. |
EMI “Screening Content from Compact Discs: ID Trac,” SDMII Jun. 3, 1999, 13 pages. |
van Schyndel et al., “Towards a Robust Digital Watermark,” ACCV '95, vol. 2, Dec., 1995, pp. 504-508. |
U.S. patent application Ser. No. 09/433,104, Rhoads et al., filed Nov. 3, 1999. |
U.S. patent application Ser. No. 09/234,780, Rhoads et al., filed Jan. 20, 1999. |
U.S. provisional application Ser. No. 60/071,983, Rhoads, filed Jan. 20, 1998. |
Chow et al., “Forgery and Tamper-Proof Identification Document,” IEEE Proc. 1993 Int. Carnahan Conf. on Security Technology, Oct. 13-15, 1993, pp. 11-14. |
Kawaguchi et al., “Principle and Applications of BPCS-Steganography,” Proc. SPIE vol. 3528: Multimedia Systems and Applications, Nov. 2-4, 1998, pp. 464-473. |
Komatsu et al., “Authentication System Using Concealed Image in Telematics,” Memoirs of the School of Science & Engineering, Waseda Univ., No. 52, 1988, pp. 45-60. |
Komatsu et al., “A Proposal on Digital Watermarking in Document Image Communication and Its Application to Realizing a Signature,” Electronics and Communications in Japan, Part I, vol., 73, No. 5, 1990, pp. 22-23. |
Seybold Report on desktop Publishing, “Holographic Signatures for Digital Images,” Aug., 1995, I page. |
Szepanski, “A Signal Theoretic Method For Creating Forgery-Proof Documents For Automatic Verification”, 1979 Carnahan Conference on Crime Countermeasures, University of Kentucky, Lexington, Kentucky, May 16-18, 1979. |